[...] Thank you for your insights, that was helpful. (My phone is for phone calls, alarm clock, notes and a web browser. I'm totally out of the loop with the app market.) You're very welcome. These days, it's possible to do a lot on a smartphone. You can shoot AND edit a professional quality featur...

So far, every language I met had *some* use case where it shines, and *some* use case where it's a poor choice. What was Java's "shining" example? *runs* The standard library is god tier. No other language even compares to it. Absolutely agree with you on this one. I think a lot of the fl...

So far, every language I met had *some* use case where it shines, and *some* use case where it's a poor choice. What was Java's "shining" example? *runs* The standard library is god tier. No other language even compares to it. Absolutely agree with you on this one. I think a lot of the fl...

Speaking for my part of the industry (keep in mind, this is not general advice): Mobile app development is big these days, and there's a shortage of programmers who can go beyond the simple "static" mobile app that just duplicates a web site. If I may pop in for a quick question, what's y...

I know it's a bit late (since you already made your purchase) but for the record, Apple's new line of iPads now support the Apple Pencil even on the cheaper models. It's around $330 for the iPad itself, plus a little under $100 for the Apple Pencil—so probably over your budget, but if you are a stud...

Speaking for my part of the industry (keep in mind, this is not general advice): Mobile app development is big these days, and there's a shortage of programmers who can go beyond the simple "static" mobile app that just duplicates a web site. While iOS dev may pay better, Android might be ...

The first language I wrote production code in used ⇐ for assignment. That was back before the days of Unicode; the editor (dare I call it an IDE?) used a special code page. Other special characters used in the language were ≤ ≥ ≠ (rather than <= >= and !=) and the tricolon ⁝ as a delimiter (to allow...

I can talk from a hiring perspective, but my approach may be a bit unconventional, so take it with a grain of salt. I've never asked a coding question during an interview. The project I head up is a fairly widely used app with a large user base. It's also quite complex, and getting the architecture ...

Note that the naive context-switch / coroutine approach won't scale to a large number of objects as it requires a whole stack (~2 MB virtual memory on Linux) per object. To do this properly in C you would have to build a state machine yourself. The op isn't talking about C. Continuations/generator ...

standard procedural languages just don't support arbitrarily pausing and resuming execution within a function without bringing the whole program (or at least the current thread) to a halt. They totally do! Python, C#, and Javascript can all do this. It's used extensively in the Unity game engine to...

On Mac, I generally just use the batch rename feature built in to Finder. But sometimes that feature isn't quite robust enough for the kind of renaming I want to do. And sometimes I need to do renaming on other platforms (Windows, Linux, etc.) It's kind of hacky, but a good general solution that I'v...

I'm not a monitor expert, but perhaps whatever component sends the EDID got fried. I'm not sure what OS you're using, but maybe there's a way to get a driver that can ignore EDID and let you arbitrarily set a resolution? Or maybe see if you can get the monitor serviced? I've been living outside of t...

If I knew more about this issue, I'd be pissed off at the terminology screw up too. Thanks for the correction. The mistake is everywhere, even in major publications. To be fair, Stagefright is kind of an unfortunate name choice: it does sound like something that would be malware. So I can understan...

http://www.zdnet.com/article/stagefright-just-how-scary-is-it-for-android-users/ Stagefright can hack your phone with an MMS... that is so carefully crafted that your phone never realized you even got the text message to begin with. Once hacked, Android Rootkits can be installed and access your ema...

I feel like you're still misunderstanding Izawwlgood's question. The question wasn't whether the unconnected laptop could be infected, but whether that would actually be a problem (in terms of personal data or botnet vulnerability or the like) if the only transfer *off* the laptop was via USB to an...

Well, for Android, if you care about updates (and you should!) any of the Nexus phones are a good choice (some might argue the only choice, because Google pushes the updates to them directly; for all other phones you are at the mercy of the OEM for updates). If you have a specialized need (for examp...

Your unconnected laptop can be assumed to be as secure as the least secure machine you transfer USB sticks to and from. So if that machine is not infected with anything, your laptop cannot be infected with anything. Technically speaking, I suppose it could be less secure than that. For example, sup...

-_- Can you not see how unhelpful and jerk-y that is? I can understand offering an opinion alongside the requested information... I honestly wasn't trying to be a jerk. I really don't think there's a way to do what you want to do. Back in the day, I'd have said "just don't open any suspicious ...

To be honest, my security procedure for XP is not running XP. Seriously, XP is very old and support has officially ended; there will be no more security updates (haven't been any for a year now). So connecting an XP system to the internet is pretty much at-your-own-risk. As time goes by and more un-...

Sure, but can I do things like add a keyword to "http://svn-server/trac/changeset/%s" so I can type "r 12345" in the browser and jump straight to a revision in version control? Or other such things that aren't specially-designated "search engines"? I just tried it, and...

I mean something like "yield return" in C#. Well, C++ is getting them shortly, and Java not having something that both C# and C++ has usually results in a least a hacked together solution. ;) Well, Java has a few hacked together solutions, but they all work by modifying the bytecode. That...

If you're talking about Objective-C, can I assume you're targeting either iOS or OS X? In that case, Objective-C++ is an option, and it's well supported (Apple uses it in sample code in cases just like this). You don't have to make the whole project Objective-C++, you could do it just for this compo...

Although I understand that mach was designed to be usable as a microkernel, you are right that the version of mach used in OS X and iOS is not a microkernel. As a side note, since you mention the memory usage of kernel_task: One has to be a bit careful when looking at how much memory a given process...

I really wish Java had continuations. I know there are some libraries that do it by messing with the bytecode, but it seems they only work with JVM. If there were continuations that could be used on DVM/ART, it would make asynchronous task management on Android so much easier. I mean something like ...

I don't think you can assign a specific technical meaning to the word "task" in general, other than "something a computer does" or "some work to be done" because it varies a lot depending on the context in which its used. In some cases, I've seen "task" used t...

Also, is 'Signal' a bad name for the thing I'm describing (an object that exists primarily to pass equality tests under certain circumstances)? Maybe the more general term you're looking for is "Predicate"? Maybe more specifically something like "MessageMatcher" or "Message...

I can't write it for you, but I (or someone else on the forum) might at least be able to give you some pointers. You say you know very little about Android programming. Does that mean you do know some? Or does it mean you don't know it at all? If you know some, how much do you know? Can you build an...

So, I have a PC, but am unfamiliar with gnuwin32. Or all these commands. Ignore all them, then. Unix commands aren't helpful (nor is telling you to install a unix utils package). Here's what you need to do: 1. Install a decent text editor. I'm very partial to Sublime Text; it'll do everything you n...

@Tub: Interesting that the weakness of a lab key is to some degree similar to a weakness of Apple Pay on a phone with Touch ID. The weakness is: Touch ID just verifies that the person using Apple Pay is the same person who set up the phone. It doesn't verify that that person is the valid cardholder...

Depending on how reliable you need it to be, and whether you don't mind about a solution that's a bit funky, one way would be to run the program in a DOS emulator in a host operating system that supports the database software directly. You could have the program write database requests as numbered t...

Just use HTTPS / HSTS - the problem you're solving has been handled via application layer protocols. (The user logs in to your service to obtain a token, but that is all done via HTTP within a secure connection). The direction of this conversation should be moving closer to where Thesh went. HTTPS ...

What's in the $J2-$R2 if the condition is false? Do you need to keep the existing data there, or can it be blank if there's no match? If it can be blank, you could just do it with a conditional formula. Put it in $J2 and then just select all the cells and fill them with the same formula. Something l...

In Korean, the 2nd case would be "어쩌고저쩌고" (eojjeogojeojjeogo). I don't know one for the 1st case in Korean; mostly I've just heard people say "아이구, 말이 너무 많아" (you talk too much). But that's not really the same thing.

I wonder if the reason there are relatively few people studying CS or programming (relative to the need for skilled professionals in these fields) is because it's so hard to get set up to make the code actually do stuff on your own computer? I haven't had a problem with that, but then again, I have...

if ncols never changes once it's set, why not put the declaration after ncols is set? I don't think that works at global scope. If it was C++, it would be easier. I don't know of any clean way to accomplish this in C. I guess you could have accessor functions to get/set an array element? (This also...

Handwriting from Google is fairly new, but the Galaxy Note line of devices have had handwriting support for a while longer. I've got a Note Pro 12.2, but I haven't used handwriting recognition enough to comment on how accurate it is; my main use is sketching rather than text input. It seems decent w...